<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 801 to 815.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-wire-amber-sinha-august-2-2017-should-an-inability-to-precisely-define-privacy-render-it-untenable-as-a-right"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/july-2017-newsletter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/asia-pacific-regional-internet-governance-forum-aprigf-2017"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/new-indian-express-kiran-parashar-km-july-26-2017-data-in-the-open-makes-it-easy-for-cyber-criminals"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cybersecurity-workshop-spotlight-on-gccs-2017"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/economic-times-july-23-2017-amber-sinha-aadhar-privacy-is-not-a-unidimensional-concept"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/reuters-july-14-2017-rahul-bhatia-and-sankalp-phartiyal-calls-for-law-change-after-indians-left-in-dark-over-data-leaks"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-wire-gaurav-vivek-bhatnagar-july-16-2017-social-activist-alleges-threat-by-police-officer-over-possession-of-aadhaar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-today-july-19-2017-aadhaar-privacy-key-issues-that-all-aadhaar-card-holders-should-bear-in-mind"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/pymnts-july-17-2017-indians-call-for-more-stringent-data-protection-laws"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-sanjeeb-mukherjee-july-14-2017-centre-to-form-panel-to-encrypt-mgnrega-dbt-database-and-prevent-leaks"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-priyanka-mittal-july-12-2017-supreme-court-sets-up-constitution-bench-to-hear-aadhaar-privacy-issues"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-july-10-2017-reliance-jio-data-leaked-on-website-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-july-5-2017-sanjay-kumar-singh-act-now-to-protect-yourself-against-future-ransomware-attacks"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/ivir-summer-course-on-privacy-law-and-policy"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-wire-amber-sinha-august-2-2017-should-an-inability-to-precisely-define-privacy-render-it-untenable-as-a-right">
    <title>Should an Inability to Precisely Define Privacy Render It Untenable as a Right?</title>
    <link>https://cis-india.org/internet-governance/blog/the-wire-amber-sinha-august-2-2017-should-an-inability-to-precisely-define-privacy-render-it-untenable-as-a-right</link>
    <description>
        &lt;b&gt;The judges may still be able to articulate the manner in which limits for a right to privacy may be arrived at, without explicitly specifying them.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="https://thewire.in/163695/inability-precisely-define-privacy-render-untenable-right/"&gt;published in the Wire&lt;/a&gt; on August 2, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Ludwig Wittgenstein wrote in his book, &lt;i&gt;Philosophical Investigations&lt;/i&gt;,  that things which we expect to be connected by one essential common  feature, may be connected by a series of overlapping similarities, where  no one feature is common. Instead of having one definition that works  as a grand unification theory, concepts often draw from a common pool of  characteristics. Drawing from overlapping characteristics that exist  between family members, Wittgenstein uses the phrase ‘family  resemblances’ to refer to such concepts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In his book, &lt;i&gt;Understanding Privacy&lt;/i&gt;, Daniel Solove makes a  case for privacy being a family resemblance concept. Responding to the  discontent in conceptualising privacy, Solove attempted to ground  privacy not in a tightly defined idea, but around a web of diverse yet  connected ideas. Some of the diverse human experiences that we  instinctively associate with privacy are bodily privacy, relationships  and family, home and private spaces, sexual identity, personal  communications, ability to make decisions without intrusions and sharing  of personal data. While these are widely diverse concepts, intrusions  upon or interferences with these experiences are all understood as  infringements of our privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other scholars too have recognised this dynamic, evolving and  difficult to pinpoint nature of privacy. Robert Post described privacy  as a concept “engorged with various and distinct meanings.” Helen  Nissenbaum advocates a dynamic idea of privacy to be understood in terms  of contextual norms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ongoing arguments in the Supreme Court on the existence of a  constitutional right to privacy can also be viewed in the context of the  idea of privacy as a family resemblance concept. In their arguments,  the counsels for the petitioners have tried to make a case for privacy  as a multi-dimensional fundamental right. Senior advocate Gopal  Subramanium argued before the court that privacy inheres in the concept  of liberty and dignity under Constitution of India, and is presupposed  by various other rights such as freedom of speech, good conscience, and  freedom to practice religion. He further goes on say that there are four  aspects to privacy – spatial, decisional, informational and the right  to develop personality. Shyam Divan, also arguing for the petitioners,  further added that privacy includes the right to be left alone, freedom  of thought, freedom to dissent, bodily integrity and informational  self-determination.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When the chief justice brought up the need to define the extent of  the right to privacy, the counsels raised concerns about the right being  defined too specifically. This reluctance was borne out of the  recognition that by its very nature, the right to privacy is a cluster  of rights, with multiple dimensions manifesting themselves in different  ways depending on the context. Both advocates, Subramaniam and Arvind  Datar, argued that court must not engage in an exercise to definitively  catalog all the different aspects of the right, foreclosing the future  development of the law on point. This reluctance was also a result of  the fact that the court has isolated the question of the existence of  the right to privacy and how it may apply in the case of the Aadhaar  project. Usually judges are able to ground legal principles in the  relevant facts of the case while developing precedents. The referral to  this bench is only on the limited question of the existence of a  constitutional right to privacy. Therefore, any limits that are  articulated by the court on the right exist without the benefit of a  context.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other hand, the Attorney General (AG) argued that this very  aspect of privacy was a rationale for not declaring it a fundamental  right. At various points during the arguments, he indicated that the  ambiguous and vague nature of the concept of privacy made it unsuitable  as a fundamental right. Similarly, Tushar Mehta, arguing for Unique  Identification Authority of India, also sought to deny privacy’s  existence as a fundamental right as it is too subjective and vague.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The above argument assumes that the inability to precisely define  privacy renders its untenable as a right. The key question is whether  this lack of a common denominator makes privacy too vague a right,  liable to expansive misinterpretations. Conceptions that do not have  fixed and sharp boundaries, are not boundless. What it means is that the  boundaries can often be fuzzy and in a state of constant evolution, but  the limits and boundaries always exist.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At one point during the hearings, Justice Rohinton Nariman wanted the  counsels to work on the parameters of challenge for state action with  respect to privacy. As mentioned earlier, in the absence of facts to  work with, such an exercise is fraught with risks. However, the judges  may still be able to articulate the manner in which such limits may be  arrived at, without specifying them. Justice Nariman himself later  agrees that the judicial examination must proceed on a case by case  basis, taking into account not only the tests under Article 14,19 and 21  under which petitioners have tried to locate privacy, but also under  any other concurrent rights which may be infringed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The AG also argued that the infringement of privacy in itself does  not amount to a violation of the rights under Article 21, rather in some  cases the transgressions on privacy may lead to an infringement of a  person’s right to liberty and only in such cases should the fundamental  rights be invoked. Thus, the argument made was that there was no need to  declare privacy as a fundamental right but only to acknowledge that  limiting privacy may sometimes lead to violations of the already  existing rights. This argument may have been more cogent had he  identified specific dimensions of privacy which, according to him, do  not qualify as fundamental rights. However, this might have meant  conceding that other dimensions of privacy, in fact do amount to  fundamental rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It must be remembered that the problem of changing or multiple  meanings is not limited to privacy. As the bench noted, drawing  comparisons to the concepts of ‘liberty’ and ‘dignity’, these are  constitutionally recognised values which equally suffer from a multitude  of meanings based on context. The government’s position here is in line  with critiques of privacy that Solove seeks to bust in his book. The  idea of privacy evolves with time and people. And people, whether from a  developed or developing polity, have an instinctive appreciation for  it. The absence of a precise definition does not necessarily do great  disservice to a concept, especially one that is fundamental to our  freedoms.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-wire-amber-sinha-august-2-2017-should-an-inability-to-precisely-define-privacy-render-it-untenable-as-a-right'&gt;https://cis-india.org/internet-governance/blog/the-wire-amber-sinha-august-2-2017-should-an-inability-to-precisely-define-privacy-render-it-untenable-as-a-right&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-08-04T01:49:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/july-2017-newsletter">
    <title>July 2017 Newsletter</title>
    <link>https://cis-india.org/about/newsletters/july-2017-newsletter</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Dear readers,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previous issues of the newsletters can be &lt;a class="external-link" href="http://cis-india.org/about/newsletters"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;table class="grid listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Highlights&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;In an &lt;a class="external-link" href="https://cis-india.org/accessibility/blog/why-gst-is-a-step-backward-for-the-disabled"&gt;article published in the Huffington Post&lt;/a&gt; on July 1, 2017, Nirmita Narasimhan stated that imposing taxes on assistive devices is unfair. It is unconscionable that disability aids and assistive technology are considered a luxury and taxed at a higher rate than rough semi-precious stones or cashew nuts.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;A &lt;span class="Object" id="OBJ_PREFIX_DWT610_com_zimbra_url"&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/patent-working-requirements-and-complex-products-an-empirical-assessment-of-indias-form-27-practice-and-compliance" target="_blank"&gt;research paper on patent working requirements and complex products&lt;/a&gt;&lt;/span&gt; in India authored by Prof Jorge L. Contreras, University of Utah, and  Rohini Lakshané, CIS has been accepted for publication in the Jindal  Global Law School Law Review 2017.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Negotiators from 16 countries met in Hyderabad for discussing a free trade agreement titled Regional Comprehensive Economic Partnership. Anubha Sinha along with Arul George Scaria reported this &lt;a class="external-link" href="https://cis-india.org/a2k/blogs/live-law-arul-george-scaria-and-anubha-sinha-live-law-rcep-ip-chapter-serious-threat-access-knowledge-cultural-goods"&gt;in an article published by Live Law.in&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Supreme Court of India while dismissing an appeal by the Indian Reprographic Rights Organization ruled that there was no copyright infringement and no licence was required since the activities  fell under the education exception in Indian copyright law. &lt;a class="external-link" href="https://cis-india.org/a2k/blogs/eifl-anubha-sinha-july-12-2017-course-packs-for-education-ruled-legal-in-india"&gt;In an article published by EIFL&lt;/a&gt;, Anubha Sinha discusses the judgment and what it means for access to educational materials in India.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Odia Wikipedians, in conjunction with Indian Athletics Federation and Sports and Youth Services collaborated to document the 2017 Asian Athletics Championships. Hundreds of photos were uploaded and new Wikipedia content added to inform the event’s fans, &lt;a class="external-link" href="https://cis-india.org/a2k/blogs/asian-athletics-championships-2017"&gt;wrote Sailesh Patnaik and Jnanaranjan Sahu in a blog post&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;As recently as May 27, 2016, the General Data Protection Regulation (REGULATION (EU) 2016/679 was adopted The Data Protection Directive (1995/46/EC) will be replaced by this Regulation. It is expected that under this Regulation data privacy will be strengthened. Aditi Chaturvedi &lt;a class="external-link" href="https://cis-india.org/internet-governance/files/GDPR_IndustrySheet_07.pdf"&gt;analyses the developments in a report&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;CIS in the news:&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/biometric-update-july-4-2017-justin-lee-uidai-declining-multiple-requests-by-police-to-share-indian-citizens-biometrics"&gt;UIDAI declining multiple requests by police to share Indian citizens’ biometrics&lt;/a&gt; (Justin Lee; Biometrics; July 4, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/business-standard-july-5-2017-sanjay-kumar-singh-act-now-to-protect-yourself-against-future-ransomware-attacks"&gt;Act now to protect yourself against future ransomware attacks&lt;/a&gt; (Sanjay Kumar Singh; Business Standard; July 5, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/livemint-july-10-2017-reliance-jio-data-leaked-on-website-report"&gt;Reliance Jio data leaked on website : report&lt;/a&gt; (Livemint; July 10, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/livemint-priyanka-mittal-july-12-2017-supreme-court-sets-up-constitution-bench-to-hear-aadhaar-privacy-issues"&gt;Supreme Court sets up constitution bench to hear Aadhaar privacy issues&lt;/a&gt; (Priyanka Mittal; Livemint; July 12, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/business-standard-sanjeeb-mukherjee-july-14-2017-centre-to-form-panel-to-encrypt-mgnrega-dbt-database-and-prevent-leaks"&gt;Centre to form panel to 'encrypt' MGNREGA-DBT database and prevent leaks&lt;/a&gt; (Sanjeeb Mukherjee; Business Standard; July 14, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/reuters-july-14-2017-rahul-bhatia-and-sankalp-phartiyal-calls-for-law-change-after-indians-left-in-dark-over-data-leaks"&gt;Calls for law change after Indians left in dark over data leaks&lt;/a&gt; (Rahul Bhatia and Sankalp Phartiyal; Reuters; July 14, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/pymnts-july-17-2017-indians-call-for-more-stringent-data-protection-laws"&gt;Indians Call For More Stringent Data Protection Laws&lt;/a&gt; (PYMTNS; July 17, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/the-wire-gaurav-vivek-bhatnagar-july-16-2017-social-activist-alleges-threat-by-police-officer-over-possession-of-aadhaar"&gt;Social Activist Alleges Threat By Police Officer Over Possession of Aadhaar&lt;/a&gt; (Gaurav Vivek Bhatnagar; Wire; July 16, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/business-today-july-19-2017-aadhaar-privacy-key-issues-that-all-aadhaar-card-holders-should-bear-in-mind"&gt;Aadhaar privacy: Key issues that all Aadhaar card holders should bear in mind&lt;/a&gt; (Business Today, July 19, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/new-indian-express-kiran-parashar-km-july-26-2017-data-in-the-open-makes-it-easy-for-cyber-criminals"&gt;Data in the open makes it easy for cyber criminals&lt;/a&gt; (Kiran Parashar KM; New Indian Express; July 26, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;CIS members wrote the following articles&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/accessibility/blog/why-gst-is-a-step-backward-for-the-disabled"&gt;Why GST Is A Step Backward For The Disabled&lt;/a&gt; (Nirmita Narasimhan; Huffington Post; July 1, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/eifl-anubha-sinha-july-12-2017-course-packs-for-education-ruled-legal-in-india"&gt;Course Packs for Education Ruled Legal in India&lt;/a&gt; (Anubha Sinha; EIFL; July 12, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/indian-express-nishant-shah-july-16-2017-digital-native-not-only-words"&gt;Digital native: Not only words&lt;/a&gt; (Nishant Shah; Indian Express; July 16, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/economic-times-july-23-2017-amber-sinha-aadhar-privacy-is-not-a-unidimensional-concept"&gt;Aadhar: Privacy is not a unidimensional concept&lt;/a&gt; (Amber Sinha; Economic Times; July 23, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/live-law-arul-george-scaria-and-anubha-sinha-live-law-rcep-ip-chapter-serious-threat-access-knowledge-cultural-goods"&gt;RCEP IP Chapter: A Serious Threat to Access to Knowledge/ Cultural Goods?&lt;/a&gt; (Arul George Scaria and Anubha Sinha; July 27, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/indian-express-nishant-shah-july-30-2017-digital-native-ever-on-the-go-digital-india-mobility"&gt;Digital native: Ever on the go&lt;/a&gt; (Nishant Shah; Indian Express; July 30, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;-------------------------------------&lt;br /&gt;&lt;a href="http://cis-india.org/accessibility"&gt;Accessibility &amp;amp; Inclusion&lt;/a&gt; &lt;br /&gt; ------------------------------------- 	&lt;br /&gt; India has an estimated 70 million persons with disabilities who don't    have access to read printed materials due to some form of physical,    sensory, 	cognitive or other disability. As part of our endeavour to    make available accessible content for persons with disabilities, we are    developing a text-to-speech software in 15 languages with support from    the Hans Foundation. The progress made so far in the project can be    accessed	&lt;a href="http://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Article&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/accessibility/blog/why-gst-is-a-step-backward-for-the-disabled"&gt;Why GST Is A Step Backward For The Disabled&lt;/a&gt; (Nirmita Narasimhan; Huffington Post; July 1, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;-----------------------------------&lt;/b&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt; &lt;br /&gt;&lt;b&gt; ----------------------------------- &lt;/b&gt;&lt;br /&gt;Our    Access to Knowledge programme currently consists of two projects. The    Pervasive Technologies project, conducted under a grant from the    International Development Research Centre (IDRC), aims to conduct    research on the complex interplay between low-cost pervasive    technologies and intellectual property, in order to encourage the    proliferation and development of such technologies as a social good. The    Wikipedia project, which is under a 	grant from the Wikimedia    Foundation, is for the growth of Indic language communities and projects    by designing community collaborations and partnerships 	that recruit    and cultivate new editors and explore innovative approaches to  building   projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Pervasive Technologies and Copyright&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Research Paper&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/patent-working-requirements-and-complex-products-an-empirical-assessment-of-indias-form-27-practice-and-compliance"&gt;Patent Working Requirements and Complex Products: An Empirical Assessment of India's Form 27 Practice and Compliance&lt;/a&gt; (Jorge L. Contreras and Rohini Lakshané; SSRN and Jindal Global Law School Review; July 17, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Participation in Event&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/news/19th-rcep-meeting"&gt;19th RCEP Meeting&lt;/a&gt; (Organized by Ministry of Commerce, Government of India; July 17 - 28, 2017; Hyderabad). Anubha Sinha participated in the meeting.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Wikipedia&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to 	more than 3500 people across India by    organizing more than 100 outreach events and catalysed the release of    encyclopaedic and other content under the 	Creative Commons (CC-BY-3.0)    license in four Indian languages (21 books in Telugu, 13 in Odia, 4    volumes of encyclopaedia in Konkani and 6 volumes in Kannada, and 1 book    on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Note: The events were organized earlier but reports were published in July 2017&lt;/i&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/christ-university-wikipedia-education-program-internship"&gt;Christ University Wikipedia Education Program Internship&lt;/a&gt; (Manasa Rao and Ananth Subray; July 5, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/christ-university-wikipedia-education-program-faculty-orientation-report"&gt;Christ University Wikipedia Education Program Faculty Orientation Report&lt;/a&gt; (Ananth Subray; July 7, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/how-it-came-to-be-wiki-loves-uniformed-services"&gt;How It Came To Be: Wiki Loves Uniformed Services&lt;/a&gt; (Krishna Chaitanya Velaga; July 10, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/tallapaka-pada-sahityam-is-now-on-wikisource"&gt;Tallapaka Pada Sahityam is now on Wikisource&lt;/a&gt; (Pavan Santhosh; July 10, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/thematic-edit-a-thon-at-yashawantrao-chavan-institute-of-science-satara"&gt;Thematic Edit-a-thon at Yashawantrao Chavan Institute of Science, Satara&lt;/a&gt; (Subodh Kulkarni; July 11, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/asian-athletics-championships-2017"&gt;Asian Athletics Championships 2017 Edit-a-thon&lt;/a&gt; (Sailesh Patnaik and Jnanaranjan Sahu; July 31, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;----------------------------------- &lt;/b&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt; &lt;br /&gt;&lt;b&gt; -----------------------------------&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As  part of its research on privacy and   free speech, CIS is engaged with  two different projects. The first  one  (under a grant from Privacy  International and IDRC) is on  surveillance  and freedom of expression  (SAFEGUARDS). The second one  (under a grant  from MacArthur Foundation)  is on restrictions that the  Indian government  has placed on freedom of  expression online.&lt;/p&gt;
&lt;p&gt;►Privacy&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Blog Entry&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/data-protection-understanding-the-general-data-protection-regulation"&gt;Data Protection: Understanding the General Data Protection Regulation&lt;/a&gt; (Aditi Chaturvedi; July 4, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/ivir-summer-course-on-privacy-law-and-policy"&gt;IViR Summer Course on Privacy Law and Policy&lt;/a&gt; (Organized by the University of Amsterdam; July 3 - 7, 2017; Amsterdam). Amber Sinha attended the course.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p&gt;►Free Speech and Expression and Cyber Security&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/ohd-on-consultation-paper-on-net-neutrality"&gt;OHD on Consultation Paper on Net Neutrality &lt;/a&gt;(Organized by Telecom Regulatory Authority of India; July 25, 2017). Pranesh Prakash was a speaker.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/asia-pacific-regional-internet-governance-forum-aprigf-2017"&gt;UNESCO Multistakeholder consultation at 8th Asia Pacific Regional Internet Governance Forum&lt;/a&gt; (APrIGF) (Organized by UNESCO; Bangkok; July 26 - 29, 2017). Sunil Abraham was a speaker. Vidhushi Marda also participated in the event.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/cybersecurity-workshop-spotlight-on-gccs-2017"&gt;Cybersecurity Workshop: Spotlight On GCCS 2017&lt;/a&gt; (Organized by Global Partners Digital (GPD) and the Centre for Communication  Governance at National Law University, Delhi, in collaboration with  Digital Empowerment Foundation, Digital Asia Hub and Open Net Korea; Bangkok; July 25 - 27, 2017). Sunil Abraham was a speaker. Udbhav Tiwari and Vidushi Marda participated in the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;----------------------------------- 	&lt;br /&gt;&lt;b&gt;&lt;a href="http://cis-india.org/telecom"&gt;Telecom&lt;/a&gt; &lt;br /&gt;&lt;b&gt; &lt;/b&gt;&lt;/b&gt;----------------------------------- &lt;br /&gt; CIS is involved in promoting access and accessibility to   telecommunications services and resources, and has provided inputs to   ongoing policy discussions 	and consultation papers published by TRAI.   It has prepared reports on unlicensed spectrum and accessibility of   mobile phones for persons with disabilities 	and also works with the   USOF to include funding projects for persons with disabilities in its   mandate:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/workshop-on-public-open-wi-fi-pilot"&gt;Workshop on Public Open Wi-Fi Pilot&lt;/a&gt; (Organized by Telecom Regulatory Authority of India; July 25, 2017). Pranesh Prakash was a speaker.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;-----------------------------------&lt;/b&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt; &lt;br /&gt;&lt;b&gt; ----------------------------------- &lt;/b&gt;&lt;br /&gt; The Researchers at Work (RAW) programme is an interdisciplinary    research initiative driven by an emerging need to understand the    reconfigurations of 	social practices and structures through the    Internet and digital media technologies, and vice versa. It aims to    produce local and contextual 	accounts of interactions, negotiations,    and resolutions between the Internet, and socio-material and    geo-political processes:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/firstfridayatcis-dr-prerna-prabhakar-impact-of-digitisation-of-land-recods-in-rural-india-july-07"&gt;Dr. Prerna Prabhakar - Impact of Digitisation of Land Records in Rural India&lt;/a&gt; (CIS, New Delhi; July 7, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;----------------------------------- &lt;/b&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt; &lt;br /&gt;&lt;b&gt; ----------------------------------- &lt;/b&gt;&lt;br /&gt; The Centre for Internet and Society (CIS) is a non-profit organisation    that undertakes interdisciplinary research on internet and digital    technologies from 	policy and academic perspectives. The areas of focus    include digital accessibility for persons with disabilities,  access   to knowledge, intellectual 	property rights, openness (including  open   data, free and open source software, open standards, open access,  open   educational resources, and open video), 	internet governance,    telecommunication reform, digital privacy, and cyber-security. The    academic research at CIS seeks to understand the reconfigurations 	of    social and cultural processes and structures as mediated through the    internet and digital media technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Follow us elsewhere&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Access to Knowledge: &lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Information Policy: &lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-Mail - Access to Knowledge: &lt;a&gt;a2k@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-Mail - Researchers at Work: &lt;a&gt;raw@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;► Support Us&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;div style="text-align: justify; "&gt;Please  help us defend consumer and   citizen rights on the Internet! Write a  cheque in favour of 'The Centre   for Internet and Society' and mail it  to us at No. 	194, 2nd 'C'  Cross,  Domlur, 2nd Stage, Bengaluru - 5600  71.&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;► Request for Collaboration&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;p style="text-align: justify; "&gt;We  invite researchers, practitioners,   artists, and theoreticians, both  organisationally and as individuals,  to  engage with us on topics  related internet 	and society, and improve  our  collective understanding  of this field. To discuss such  possibilities,  please write to Sunil  Abraham, Executive Director, at 	  sunil@cis-india.org (for policy  research), or Sumandro Chattapadhyay,   Research Director, at  sumandro@cis-india.org (for academic research),   with an 	indication of  the form and the content of the collaboration  you  might be interested  in. To discuss collaborations on Indic  language  Wikipedia projects, 	 write to Tanveer Hasan, Programme  Officer, at &lt;a&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;i&gt;CIS  is grateful to its primary   donor the Kusuma Trust founded by Anurag  Dikshit and Soma Pujari,   philanthropists of Indian origin for its core  funding and 	support for   most of its projects. CIS is also grateful to  its other donors,   Wikimedia Foundation, Ford Foundation, Privacy  International, UK, Hans  	 Foundation, MacArthur Foundation, and IDRC for  funding its various   projects&lt;/i&gt;.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/july-2017-newsletter'&gt;https://cis-india.org/about/newsletters/july-2017-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2017-08-23T02:03:19Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/asia-pacific-regional-internet-governance-forum-aprigf-2017">
    <title>UNESCO Multistakeholder consultation at 8th Asia Pacific Regional Internet Governance Forum (APrIGF)</title>
    <link>https://cis-india.org/internet-governance/news/asia-pacific-regional-internet-governance-forum-aprigf-2017</link>
    <description>
        &lt;b&gt;Sunil Abraham was a speaker at the APrIGF 2017 organized by UNESCO in Bangkok from July 26 to 29, 2017. Vidushi Marda also participated in the event.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;UNESCO takes the occasion to present its&lt;b&gt; &lt;/b&gt;new project&lt;b&gt; “Defining Internet Universality Indicators” &lt;/b&gt;and engage with Asia-Pacific stakeholders, including young experts, at the 8&lt;sup&gt;th&lt;/sup&gt; Asia Pacific Regional Internet Governance Forum (APrIGF) for their inputs and contributions. This is a part of a &lt;b&gt;global consultation&lt;/b&gt; to develop a set of Internet Universality indicators. The project is an immediate response following UNESCO’s adoption of the &lt;b&gt;‘CONNECTing the Dots’ Outcome document i&lt;/b&gt;&lt;b&gt;n 2015&lt;/b&gt;, where UNESCO put the concept of ‘Internet Universality’ at the heart of its work to promote an Internet that works for all. &lt;b&gt;Internet universality&lt;/b&gt; points to four fundamental norms – known for short as the &lt;b&gt;ROAM&lt;/b&gt; &lt;b&gt;principles&lt;/b&gt; – which are the guiding framework that promotes an Internet based on:&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;Rights (R)&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;Openness (O)&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;Accessibility (A) &lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;Multistakeholder Participation (M)&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The project aims to &lt;b&gt;elaborate appropriate Internet indicators&lt;/b&gt;, which can serve to enrich the stakeholders’ capacity for assessing Internet development, broaden international consensus, and foster online democracy and human rights towards knowledge societies engaged in sustainable development. These indicators will&lt;b&gt; help governments and other stakeholders&lt;/b&gt; to assess their own national Internet environments and to promote the values associated with Internet Universality. Special attention will be paid to &lt;b&gt;gender&lt;/b&gt; and to the &lt;b&gt;needs and interests of&lt;/b&gt; &lt;b&gt;children&lt;/b&gt; and &lt;b&gt;young people&lt;/b&gt;. There will be a mix of quantitative and qualitative indicators. The work on the project to define Internet Universality indicators is being led for UNESCO by the Association for Progressive Communications (APC).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;b&gt;8&lt;sup&gt;th &lt;/sup&gt;&lt;/b&gt;&lt;b&gt;APrIGF&lt;/b&gt; is of high pertinence to the Internet Universality Indicators because it serves as a multi-stakeholder platform for public policy on Internet and its impact on society. It draws discussions and powers collaborations for the developments of &lt;b&gt;universally affordable, accessible, non-discriminated, secure and sustainable&lt;/b&gt; &lt;b&gt;Internet&lt;/b&gt; across the region, which are the focus topics of UNESCO’s multi-stakeholder consultation; as well as addressing &lt;b&gt;gender inclusion&lt;/b&gt; and the &lt;b&gt;inclusion of children and young people in the Internet environment&lt;/b&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The session will start with a brief presentation of the draft indicators and brief remarks from the speakers. The moderator will structure the discussion into five slots on Human Rights, Openness, Access, Multi-stakeholderism and crosscutting dimension and will invite all of you to take the floor. Focus groups will possibly be created to facilitate more in-depth discussion among participants. Some key questions will be asked to all participants regarding your experience of gathering and using Internet indicators within your country/area of work or the most important issues related to human rights, openness, accessibility and multistakeholder approach that should be included in the Internet Universality indicators.&lt;/p&gt;
&lt;p&gt;A draft background paper on Defining Internet Universality Indicators will be shared and released before the session as a basis for discussion.&lt;/p&gt;
&lt;p&gt;Written contribution is welcome via UNESCO &lt;b&gt;email&lt;/b&gt;: &lt;a href="mailto:internetstudy@unesco.org"&gt;internetstudy@unesco.org&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;An online platform for consultation will be available at: &lt;a href="http://www.unesco.org/new/en/internetuniversality"&gt;http://www.unesco.org/new/en/internetuniversality&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-decoration: underline;"&gt;In-Person Co-Moderators&lt;/span&gt;: Ms. Xianhong Hu; Ms. Chat Garcia Ramilo&lt;/p&gt;
&lt;p&gt;&lt;span style="text-decoration: underline;"&gt;Speakers&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Presentation of the project&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Ms Xianhong Hu, UNESCO&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Speakers on &lt;b&gt;Human Rights&lt;/b&gt; dimension indicators&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Ms Gayatri Khandahai, APC&lt;/li&gt;
&lt;li&gt;Ms. Anja Kovacs, Internet Democracy Project&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Speakers on &lt;b&gt;Openness&lt;/b&gt; indicators&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Ms Xue Hong, Beijing Normal University&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Speakers on &lt;b&gt;Accessibility&lt;/b&gt; indicators&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Mr. Winston Roberts, International Federation of Library Associations &amp;amp; Institutions&lt;/li&gt;
&lt;li&gt;Ms. Piyawan Suwattanathum, UNESCO Bangkok Education&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Speakers on &lt;b&gt;Multi-stakeholderism&lt;/b&gt; indicators&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Mr. Sunil Abraham, Center for Internet Society&lt;/li&gt;
&lt;li&gt;Mr. Naveed Haq, ISOC&lt;/li&gt;
&lt;li&gt;Ms. Joyce Chen, ICANN&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Speakers on &lt;b&gt;Crosscutting &lt;/b&gt;dimension indicators&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Ms. Bishakha Datta, Point of View&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt;Vidushi participated in the following meetings on July 26:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Fellowship Morning Meeting &lt;/li&gt;
&lt;li&gt;Meet &amp;amp; Greet for Fellows &amp;amp; Buddies&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Sharing of IG/Internet in your economies&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Expectation Setting &amp;amp; Quick Brief of 3 days agenda&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Capacity Building Day (13:00 - 18:30)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Welcome Social for Fellows @CU International House&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The following meetings on July 27:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Opening Plenary&lt;/li&gt;
&lt;li&gt;Synthesis Document Townhall Sessions&lt;/li&gt;
&lt;li&gt;Respective sub-theme sessions assigned for rapporteur work&lt;/li&gt;
&lt;li&gt;Closing Plenary&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Digital Asia Hub and CIS workshop on "Technology and Extremism" was a highlight of the event.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vidushi moderated a panel discussing the PT project and sharing key findings, titled: "Towards Sustainable Development in Asia Pacific: Mobile Internet and Access to Knowledge in the Marketplace".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vidushi also attended the Global Partners Digital Event on the GCCS. List of APrIGF fellows can be &lt;a class="external-link" href="https://2017.aprigf.asia/fellows/"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/asia-pacific-regional-internet-governance-forum-aprigf-2017'&gt;https://cis-india.org/internet-governance/news/asia-pacific-regional-internet-governance-forum-aprigf-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-08-09T01:49:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/new-indian-express-kiran-parashar-km-july-26-2017-data-in-the-open-makes-it-easy-for-cyber-criminals">
    <title>Data in the open makes it easy for cyber criminals</title>
    <link>https://cis-india.org/internet-governance/news/new-indian-express-kiran-parashar-km-july-26-2017-data-in-the-open-makes-it-easy-for-cyber-criminals</link>
    <description>
        &lt;b&gt;With data of about 10 crore bank accounts available in the public domain, it has become easy for cyber criminals to steal money. What makes detection of such crimes tough is the lack of convergence between various departments and sectors.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Kiran Parashar KM was &lt;a class="external-link" href="http://www.newindianexpress.com/cities/bengaluru/2017/jul/26/data-in-the-open-makes-it-easy-for-cyber-criminals-1633664.html"&gt;published in the New Indian Express&lt;/a&gt; on July 26, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;A recent report of Centre for Internet and Society-India suggests  that data of 10 crore bank accounts is available in the public domain.  It points out that the availability of Aadhaar numbers along with bank  accounts and phone numbers increases the risk of financial fraud. Social  engineering is often used to find out details of bank accounts, credit  card numbers and passwords to steal money.&lt;br /&gt; Investigating officials say once a victim files a complaint, they seek  information from banks and many times, private banks don’t even reply.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Also,  we also have observed there are a lot of loopholes in the banking  system. Banks outsource credit/debit card issuance and maintenance to  agencies who follow security protocols. In many cases, insiders helped  in sharing information,” a police officer said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nilesh Jain, Country Manager — (India and SAARC), Trend Micro, which  provides cyber security solutions, says, “With more people using online  transactions, there is a growing number of hackers. Most ATMs are on the  legacy operating system of Windows. Banks have started realising that  there are malwares designed to attack ATMs.With RBI mandating that banks  should report security attacks within six hours, hackers will no longer  get an upper hand.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, Policy Director at the  Centre for Internet and Society, says, “There are many ways bank  customers can safeguard themselves: using a browser-based password  manager, and by never entering their banking username on any site other  than their bank (which they should confirm via web address). Banks  should offer a form of multi-factor authentication called “universal 2nd  factor” (U2F) which prevents fraud in the form of man-in-the-middle  attacks by phishing websites. Unless banks roll out U2F, they should  refund any losses a customer faces due to fraud.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Case studies&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;June 2017&lt;br /&gt; Vinod Kumar Pacchiyappan, manager of SBI Cards and Payment Services Pvt  Ltd filed a police complaint that Know Your Customer data of customers  was compromised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;May 2016&lt;br /&gt;A US couple were cheated of D6 lakh in just two hours where criminals used their bank data and shopped online.&lt;br /&gt; &lt;br /&gt;January 2016&lt;br /&gt; Seven people from Telangana, including an Axis Bank deputy manager, were  held in Bengaluru for allegedly hacking into people’s bank accounts  using mobile banking apps and stealing money.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/new-indian-express-kiran-parashar-km-july-26-2017-data-in-the-open-makes-it-easy-for-cyber-criminals'&gt;https://cis-india.org/internet-governance/news/new-indian-express-kiran-parashar-km-july-26-2017-data-in-the-open-makes-it-easy-for-cyber-criminals&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-07-29T02:40:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cybersecurity-workshop-spotlight-on-gccs-2017">
    <title>Cybersecurity Workshop: Spotlight On GCCS 2017</title>
    <link>https://cis-india.org/internet-governance/news/cybersecurity-workshop-spotlight-on-gccs-2017</link>
    <description>
        &lt;b&gt;Sunil Abraham, Udbhav Tiwari and Vidushi Marda attended this workshop which was held alongside the Asia Pacific Regional Internet Governance Forum (APrIGF) between the 25 - 27 July 2017 in Mahitaladhibesra Building, Chulalongkorn University, Bangkok, Thailand. It was organised by Global Partners Digital (GPD) and the Centre for Communication Governance at National Law University, Delhi, in collaboration with Digital Empowerment Foundation, Digital Asia Hub and Open Net Korea&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Sunil was a speaker in one of the introductory sessions, while Udbhav was a  participant in the workshop.The workshop consisted of various  participants from the Asian region and the sessions concentrated on  cyber capacity building in the context of  the Global Conference on  Cyberspace 2017.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cybersecurity-workshop-spotlight-on-gccs-2017'&gt;https://cis-india.org/internet-governance/news/cybersecurity-workshop-spotlight-on-gccs-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-08-23T00:47:36Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/economic-times-july-23-2017-amber-sinha-aadhar-privacy-is-not-a-unidimensional-concept">
    <title>Aadhar: Privacy is not a unidimensional concept</title>
    <link>https://cis-india.org/internet-governance/blog/economic-times-july-23-2017-amber-sinha-aadhar-privacy-is-not-a-unidimensional-concept</link>
    <description>
        &lt;b&gt;Right to privacy is important not only for our negotiations with the information age but also to counter the transgressions of a welfare state. A robust right to privacy is essential for all Indian citizens to defend their individual autonomy in the face of invasive state actions purportedly for the public good.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="http://economictimes.indiatimes.com/news/politics-and-nation/aadhar-privacy-is-not-a-unidimensional-concept/printarticle/59716562.cms"&gt;Economic Times&lt;/a&gt; on July 23, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The ruling of this nine-judge bench will have far-reaching impact on the extent and scope of rights available to us all. In a disappointing case of judicial evasion by the apex court, it has taken over 600 days since a reference order was passed in August 11, 2015, for this bench to be constituted. Over two days of arguments, the counsels for the petitioners have presented before the court why the right to privacy, despite not finding a mention in the Constitution of India, is a fundamental right essential to a person’s dignity and liberty, and must be read into not one but multiple articles of the Constitution. The government will make its arguments in the coming week.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One must wonder why we are debating the contours of the right to privacy, which 40 years of jurisprudence had lulled us into believing we already had. The answer to that can be found in a series of hearings in the Aadhaar case that began in 2012. Justice KS Puttaswamy, a former Karnataka High Court judge, filed a petition before the Supreme Court, questioning the validity of the Aadhaar project due its lack of legislative basis (since then the Aadhaar Act was passed in 2016) and its transgressions on our fundamental rights. Over time, a number of other petitions also made their way to the apex court, challenging different aspects of the Aadhaar project. Since then, five different interim orders by the Supreme Court have stated that no person should suffer because they do not have an Aadhaar number. Aadhaar, according to the court, could not be made mandatory to avail benefits and services from government schemes. Further, the court has limited the use of Aadhaar to specific schemes: LPG, PDS, MGNREGA, National Social Assistance Programme, the Pradhan Mantri Jan Dhan Yojna and EPFO.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The real spanner in the works in the progress of this case was the stand taken by Mukul Rohatgi, then attorney general of India who, in a hearing before the court in July 2015, stated that there is no constitutionally guaranteed right to privacy. His reliance was on two Supreme Court judgments in MP Sharma v Satish Chandra (1954) and Kharak Singh v State of Uttar Pradesh (1962): both cases, decided by eight- and six-judge benches respectively, denied the existence of a constitutional right to privacy. As the subsequent judgments which upheld the right to privacy were by smaller benches, Rohatgi claimed that MP Sharma and Kharak Singh still prevailed over them, until they were overruled by a larger bench.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The reference to a larger bench has since delayed the entire matter, even as a number of government schemes have made Aadhaar mandatory. This reading of privacy as a unidimensional concept by the courts is, with due respect, erroneous. Privacy, as a concept, includes within its scope, spatial, familial, informational and decisional aspects. We all have a legitimate expectation of privacy in our private spaces, such as our homes, and in our personal relationships. Similarly, we must be able to exercise some control over how personal data, like our financial information, are disseminated. Most importantly, privacy gives us the space to make autonomous choices and decisions without external interference. All these dimensions of privacy must stand as distinct rights. In MP Sharma, the court rejected a certain aspect of the right of privacy by refusing to acknowledge a right against search and seizure. This, in no way prevented the court, even in the form of a smaller bench, from ruling on any other aspects of privacy, including those that are relevant to the Aadhaar case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The limited referral to this bench means that the court will have to rule on the status of privacy and its possible limitations in isolation, without even going into the details of the Aadhaar case (based on the nature of protection that this bench accords to privacy, the petitioners and defendants in the Aadhaar case will have to argue afresh on whether the project does impede on this most fundamental right). There are no facts of the case to ground the legal principles in, and defining the contours of a right can be a difficult exercise. The court must be wary of how any limits they put on the right may be used in future. Equally, it is important to articulate that any limitations on the right to privacy due to competing interests such as national security and public interest must be imposed only when necessary and always be proportionate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It will not be enough for the court to merely state that we have a constitutional right to privacy. They would be well advised to cut through the muddle of existing privacy jurisprudence, and unequivocally establish the various facets of the right. Without that, we may not be able to withstand the modern dangers of surveillance, denial of bodily integrity and self-determination through forcible collection of information. The nine judges, in their collective wisdom, must not only ensure that we have a right to privacy, but also clearly articulate a robust reading of this right capable of withstanding the growing interferences with our autonomy.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/economic-times-july-23-2017-amber-sinha-aadhar-privacy-is-not-a-unidimensional-concept'&gt;https://cis-india.org/internet-governance/blog/economic-times-july-23-2017-amber-sinha-aadhar-privacy-is-not-a-unidimensional-concept&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-08-23T01:50:19Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/reuters-july-14-2017-rahul-bhatia-and-sankalp-phartiyal-calls-for-law-change-after-indians-left-in-dark-over-data-leaks">
    <title>Calls for law change after Indians left in dark over data leaks</title>
    <link>https://cis-india.org/internet-governance/news/reuters-july-14-2017-rahul-bhatia-and-sankalp-phartiyal-calls-for-law-change-after-indians-left-in-dark-over-data-leaks</link>
    <description>
        &lt;b&gt;Fears Indian telecom upstart Reliance Jio suffered a major data breach, compromising the personal data of over 100 million customers, have prompted calls for India to adopt more robust laws to protect consumers. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Rahul Bhatia and Sankalp Phartiyal was &lt;a class="external-link" href="https://www.reuters.com/article/us-india-cyber-analysis-idUSKBN19Z1BQ"&gt;published by Reuters&lt;/a&gt; on July 14, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Jio has repeatedly denied any breach took place and  said that names, telephone numbers and email addresses of Jio users on a  website called "Magicapk" appeared to be "unauthentic." The website was  later shut down.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The company, part of  conglomerate Reliance Industries Ltd, said on Monday that its subscriber  data was safe and protected by the highest levels of security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, Jio filed a complaint the same day alleging unlawful access to its systems, police have told Reuters.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jio did not respond to requests for comment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In  contrast to companies in the European Union, which has stringent data  protection standards, companies in India do not have to disclose data  breaches to clients, information security professionals said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It  raises questions of security and accountability," said Pranesh Prakash,  policy director at the Centre for Internet and Society (CIS), a  research organization.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;People complained on  Twitter about personal information of Jio users being available on the  Magicapk site. Several local news outlets said their checks had led them  to believe a leak had occurred.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"A rule to  report breaches exists, but it is unenforceable," says Prakash. "It says  you're not liable if you're following reasonable security practices.  What 'reasonable' means is not defined."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Advocates  of stronger laws in India say a data breach in countries with more  stringent cyber laws, such as Britain or the United States, would prompt  an inquiry by regulators.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After reports of a  data leak at Verizon earlier this week, for example, the U.S. telecoms  firm quickly responded with an explanation of what had occurred, how it  had happened and the extent of the problem.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"India  is at a nascent stage. For good norms in Asia, look to Singapore. It's  been praised for not having cyber security issues by the UN," Srinivas  Kodali, an independent security researcher, said.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Not a Priority&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;"We  don't have full-menu data protection laws," said Apar Gupta, a Supreme  Court lawyer working on data privacy issues. "We don't even have an  institutional framework or expert body to implement the limited data  protection regulations that do exist. It's so limited it's more accurate  to say no law exists."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In May alone, there were two data security incidents in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  records of 17 million customers of Zomato, a popular food-delivery app,  were put on sale online. Zomato initially advised customers that their  passwords were secure, but later advised users to change them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Separately,  a CIS report said the Aadhaar numbers of as many as 135 million Indians  had leaked from government databases and could be found online. (&lt;a href="http://bit.ly/2tOseSV"&gt;bit.ly/2tOseSV&lt;/a&gt;)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  number, similar to a U.S. social security number, is unique to each  Indian citizen and the Aadhaar database also stores a user's biometric  data. The government is pushing for Aadhaar numbers to be used in  everything from opening bank accounts to filing tax returns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For India, data privacy is not a priority, said Amry Junaideen, a risk advisor at audit firm Deloitte.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"From  an organizational perspective there's really no incentive other than  being a good corporate citizen, to report a breach," he said, noting  that in the European Union and United States the regulatory framework is  basically for the good of the consumer, but that this is not the case  in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India, home to the back offices of  many large multinationals and outsourcing companies, has also  unsuccessfully sought "data-secure" status from the European Union since  2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The status is vital for information  sharing between entities in the EU and India, because it means the EU is  satisfied that data protection rules in a country meet its standards,  so data of EU citizens can be sent to that jurisdiction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Raman  Chima, policy director at Access Now, which advocates stronger digital  rights, says weak data privacy laws are likely the main stumbling block  to "data-secure" status.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2010, a European Union study of data  protection in India noted there were "no aspects of India's data  protection which would unequivocally be regarded as 'adequate' by  European Union standards as yet".&lt;/p&gt;
&lt;div class="Attribution_attribution_o4ojT" style="text-align: justify; "&gt;
&lt;p class="Attribution_content_27_rw"&gt;Reporting by Rahul Bhatia and Sankalp Phartiyal; Editing by Euan Rocha and Neil Fullick&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/reuters-july-14-2017-rahul-bhatia-and-sankalp-phartiyal-calls-for-law-change-after-indians-left-in-dark-over-data-leaks'&gt;https://cis-india.org/internet-governance/news/reuters-july-14-2017-rahul-bhatia-and-sankalp-phartiyal-calls-for-law-change-after-indians-left-in-dark-over-data-leaks&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-07-20T14:38:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-wire-gaurav-vivek-bhatnagar-july-16-2017-social-activist-alleges-threat-by-police-officer-over-possession-of-aadhaar">
    <title>Social Activist Alleges Threat By Police Officer Over Possession of Aadhaar</title>
    <link>https://cis-india.org/internet-governance/news/the-wire-gaurav-vivek-bhatnagar-july-16-2017-social-activist-alleges-threat-by-police-officer-over-possession-of-aadhaar</link>
    <description>
        &lt;b&gt;Social activist Shabnam Hashmi recorded a policeman telling her those without address proof and Aadhaar could be “eliminated”.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Gaurav Vivek Bhatnagar was published in the &lt;a class="external-link" href="https://thewire.in/158107/fear-around-misuse-of-aadhar/"&gt;Wire&lt;/a&gt; on July 16, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Well-known social activist Shabnam Hashmi held a press conference to  say she was threatened on the telephone by a police officer at the  Lajpat Nagar police station warning her that the government had   launched a ‘surround and eliminate’ campaign against people whose  addresses are not known and who do not possess Aadhaar numbers or cards.  This is now a standing instruction to all police stations, Hashmi was  told. Moreover, the officer –  accused of threatening and abusing Hashmi  when she called him on the night of July 14 to know why the husband of a  woman, who learns stitching at a training centre run by the NGO Pehchan  at Jaitpur in south-east Delhi, had been summoned at a late hour –  insisted that police personnel were well within their rights to act in  this way.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The police may brush aside this assertion as the concerned officer’s  personal opinion, or they may deny the veracity of the conversation, &lt;a href="https://www.youtube.com/watch?v=Az2WR54QWTE" rel="external nofollow" target="_blank" title="which Hashmi recorded and shared with the media"&gt;which Hashmi recorded and shared with the media&lt;/a&gt;;  but she and other anti-Aadhaar activists say the interaction raises  questions about the consequences – intended or unintended – of the  Centre’s stress on making Aadhaar mandatory for the personal liberty and  civil rights of ordinary residents.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many Aadhaar critics have, in the past, expressed the fear that the  irresponsible use or misuse of Aadhaar could lead to India becoming a  ‘surveillance state’ or ‘police state’  by placing enormous  discretionary powers in the hands of unscrupulous state officials.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Petitioners in SC had cautioned against misuse of Aadhaar&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Earlier this year, Communist Party of India leader Binoy Viswam had  filed a petition in the Supreme Court questioning the introduction of  Section 139 AA of the IT Act to link Aadhaar cards with PAN cards.  Subsequently, &lt;a href="http://www.rediff.com/news/interview/aadhaar-is-very-dangerous-for-the-indian-nation/20170425.htm" rel="external nofollow" target="_blank" title="in an interview"&gt;in an interview&lt;/a&gt; in  April this year, he had noted that “the citizens are becoming  instruments in the hands of the state” as “by taking fingerprints, iris  scans and other details of the citizens of the country, the state is  becoming the custodian of its people.” He had also expressed the fear  that “the state can use this data according to its whims and fancies”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Viswam could not have been more correct. Much before the use of data,  “elements” of the state have started using the ruse of creation of data  itself as a convenient tool to threaten and intimidate people and this  is precisely what happened in the case of Hashmi.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recalling the incident, Hashmi, who is the founding trustee of  Pehchan, said the NGO runs a small centre in Jaitpur extension where it  teaches school dropouts to appear for class 10 and 12 examinations and  also runs sewing classes for women.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hashmi said that at around 9 pm on July 14, Haseen, the husband of  Mubina, one of the trainees, was summoned by a sub-inspector to the  Lajpat Nagar police station regarding a complaint. When Hashmi called up  the police station to find out what the summons was about, the  policeman allegedly “hurled abuses”, and used “highly derogatory and  uncivilised language” during the conversation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though Hashmi did not have a recorder in her phone at the time of the  first call, she subsequently downloaded one and later recorded her  conversation with the same officer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this conversation, the policeman is heard reasoning with Hashmi  that he had not summoned Haseen at a late hour. He claimed that he used  harsh language in the first conversation since she had not identified  herself and had only proclaimed herself to be a social worker. It also  comes across in the conversation that Hashmi had told the man in the  earlier conversation that he was drunk while being on duty and that this  had irked him. It emerged that the cop had got an inkling that she was  recording the later conversation, because of which he apparently  mellowed down.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The issue assumes significance as after declaring twice in the past  that Aadhaar cannot be made mandatory for delivering services, the &lt;a href="http://www.thehindu.com/news/national/supreme-court-upholds-aadhaar-pan-linkage/article18903048.ece" rel="external nofollow" target="_blank" title="Supreme Court had recently upheld"&gt;Supreme Court had recently upheld&lt;/a&gt; the validity of an Income Tax law amendment linking PAN with Aadhaar for filing tax returns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Former Attorney General Mukul Rohatgi had argued that the  government was “entitled to have identification”  and that “as  constituents of society people can’t claim immunity from  identification.” Rohatgi had insisted that “no right is absolute, right  to body is not absolute. Under extreme cases even right to life can be  taken away, under due process.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Experts have often cautioned against Aadhaar misuse&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to legal experts, the illegalities related to Aadhaar do not just end with such arguments. Writing for &lt;i&gt;The Wire&lt;/i&gt;, Prashant Reddy T., a research associate at the School of Law, Singapore Management University, &lt;a href="https://thewire.in/148687/mandatory-aadhaar-bank-accounts-legality/" rel="noopener noreferrer" target="_blank" title="had noted that"&gt;had noted that&lt;/a&gt; in the past couple of months the “Modi government has increasingly used  its rule-making powers under various laws in a manner which is contrary  to the law of the land.” He was referring to the Centre’s announcement  to mandatorily link Aadhaar numbers to all non-small bank accounts,  failing which, access to the bank accounts would be disabled after  December 31.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“As is often the case with this government, the question now is  whether this new mandatory Aadhaar requirement (and the threatened  punishment) is legal,” the expert had asked.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Earlier this year, writing for the &lt;i&gt;Hindustan Times&lt;/i&gt;, Pranesh  Prakash, policy director at the Centre for Internet and Society, and an  affiliated fellow at Yale Law School’s Information Society Project, &lt;a href="http://www.hindustantimes.com/india-news/what-s-really-happening-when-you-swipe-your-aadhaar-card-to-make-a-payment/story-2fLTO5oNPhq1wyvZrwgNgJ.html" rel="external nofollow" target="_blank" title="had referred"&gt;had referred&lt;/a&gt; to  the immense potential of Aadhaar for profiling and surveillance. He had  called for fundamentally altering Aadhaar, saying that if the rampant  misuse of surveillance and wilful ignorance of the law by the state were  anything to go by, the future looked bleak.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-wire-gaurav-vivek-bhatnagar-july-16-2017-social-activist-alleges-threat-by-police-officer-over-possession-of-aadhaar'&gt;https://cis-india.org/internet-governance/news/the-wire-gaurav-vivek-bhatnagar-july-16-2017-social-activist-alleges-threat-by-police-officer-over-possession-of-aadhaar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-07-20T14:31:12Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-today-july-19-2017-aadhaar-privacy-key-issues-that-all-aadhaar-card-holders-should-bear-in-mind">
    <title>Aadhaar privacy: Key issues that all Aadhaar card holders should bear in mind</title>
    <link>https://cis-india.org/internet-governance/news/business-today-july-19-2017-aadhaar-privacy-key-issues-that-all-aadhaar-card-holders-should-bear-in-mind</link>
    <description>
        &lt;b&gt;As the Supreme Court hears petitions whether the right to privacy is a fundamental right, there are some key aspects that Aadhar Card holders should bear in mind, especially, because the government has made Aadhaar mandatory for a number of schemes and official purposes, including the filing of income tax returns.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.businesstoday.in/current/economy-politics/aadhaar-privacy-key-issues-that-all-aadhaar-card-holders-should-bear-in-mind/story/256723.html"&gt;published by Business Today&lt;/a&gt; on July 19, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Linking of PAN with Aadhaar: What it means&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  government claims that by linking the Aadhaar with PAN, authorities will  be able to crack down on people with multiple PAN cards, and those who  are escaping the tax net. The government has also made it clear that all  bank accounts will have to be linked to Aadhar by the end of this year.  This, essentially, implies that the government will be able track  financial transactions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Amit  Maheshwari, Partner, Ashok Maheshwary &amp;amp; Associates LLP, says, "As  the bank accounts of the person would already have PAN as his/her KYC  requirement, once Aadhaar is linked with PAN, it will certainly lead to  automatic link with the bank accounts as well."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Since Aadhaar is  based on biometrics, the chances of duplication are much less as  compared to PAN, which is not based on biometrics," Maheshwari adds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According  to the latest data, there are more than 24.37 crore PANs registered in  the country, while Aadhaar card has been issued to 113 crore people.  Against this, only 2.87 crore individuals filed income tax returns (in  the assessment year 2012-2013), out of which 1.62 crore did not pay any  tax - leaving the number of taxpayers at just one per cent of the  country's total population. Given the abysmally low number of tax payers  in the country, the government intends to keep a close watch on tax  evaders with this move.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although the judgment is awaited, here's a low-down on how to link your PAN card with Aadhaar:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Register on the e-Filing portal of the Income Tax Department, www.incometaxindiaefiling.gov.in&lt;/li&gt;
&lt;li&gt;Enter log-in ID, password and date of birth&lt;/li&gt;
&lt;li&gt;After  logging in, go to your profile setting which has the option of linking  your Aadhaar Card. Generally, a pop-up window appears, prompting you to  link your PAN card with Aadhaar card.&lt;/li&gt;
&lt;li&gt;Check if the details such as name, date of birth and gender appearing on screen match with those on your Aadhaar card.&lt;/li&gt;
&lt;li&gt;Enter  your Aadhaar card number and click on the 'link now' button. If details  on both the cards match, your card will be linked instantly.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;&lt;b&gt;Aadhaar prone to financial frauds&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many  civil rights activists have raised concerns about privacy and security  of data under Aadhar. Bangalore-based civil society group, The Centre  for Internet and Society (CIS), has expressed concerns over the lack of  security features associated with Aadhaar-linked financial transactions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Authored  by Amber Sinha and Srinivas Kodali, the CIS report pointed out that  unless sufficient security features are added, the system is prone to  financial frauds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The availability of large datasets of Aadhaar  numbers along with bank account numbers and phone numbers on the  Internet increases the risk of financial fraud," the report said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According  to the authors, social engineering is often used to find out bank  account details, credit card numbers and passwords to steal money from  people's accounts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"One of the prime examples is individuals  receiving phone calls from someone claiming to be from the bank. Aadhaar  data makes this process much easier for fraud and increases the risk  around transactions. In the US, the ease of getting Social Security  Numbers from public databases has resulted in numerous cases of identity  theft. These risks increase multifold in India due the proliferation of  Aadhaar numbers and other related data available," the report pointed  out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;How secure is Aadhar Pay?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In May, when malicious  ransomware (in which the attacker locks down your computer and demands  money to unlock it) infected hundreds of computers in different  countries, questions were raised on how safe are we from cyber attacks,  especially when digital transactions are increasing by leaps and bounds?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  government launched Aadhaar Pay, a platform that allows you to make  payments using Aadhaar number-linked bank accounts. It is a merchant  version of Aadhaar-enabled payment system which lets you make payments  without a smartphone. One just requires the fingerprint of the payer for  authentication; there is no need for a POS machine to swipe the card.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However,  when passwords are fallible, how reliable can biometric authentication  from Aadhaar Pay be, particularly when there have been cases of leakage  of Aadhaar data? According to some experts, Aadhaar authentication is  pretty strong because you cannot connect to the Aadhaar database except  through secured APIs.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-today-july-19-2017-aadhaar-privacy-key-issues-that-all-aadhaar-card-holders-should-bear-in-mind'&gt;https://cis-india.org/internet-governance/news/business-today-july-19-2017-aadhaar-privacy-key-issues-that-all-aadhaar-card-holders-should-bear-in-mind&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-07-20T14:18:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/pymnts-july-17-2017-indians-call-for-more-stringent-data-protection-laws">
    <title>Indians Call For More Stringent Data Protection Laws</title>
    <link>https://cis-india.org/internet-governance/news/pymnts-july-17-2017-indians-call-for-more-stringent-data-protection-laws</link>
    <description>
        &lt;b&gt;The government is India is facing calls to establish better cybersecurity laws to protect consumers’ data after fears have crept up that Reliance Jio, the telecom startup in India, suffered a major data leak.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This report was published by &lt;a class="external-link" href="http://www.pymnts.com/news/security-and-risk/2017/indians-call-for-more-stringent-data-protection-laws/"&gt;PYMNTS&lt;/a&gt; on July 17, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;According to a &lt;a href="http://www.reuters.com/article/somalia-internet-idUSL8N1K70GD?feedType=RSS&amp;amp;feedName=internetNews" rel="noopener" target="_blank"&gt;report in Reuters&lt;/a&gt; announcing the news, Jio denied the data &lt;a href="http://www.pymnts.com/news/security-and-risk/2017/indian-companies-diss-bitcoin-for-ransomware-payments/" rel="noopener" target="_blank"&gt;leak&lt;/a&gt; took  place, saying the names, telephone numbers and email addresses of Jio  users that showed up on Magicpak, a website, were unauthentic. Its  parent Reliance Industries said customers’ data was safe and protected. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;But at the same time that it was  issuing reassurances, Jio filed a complaint claiming unlawful access to  its computer systems, reported Reuters. That discrepancy has led Indians  to call for better laws for data protection for consumers. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;“It raises questions of security and  accountability,” said Pranesh Prakash, policy director at the Centre for  Internet and Society (CIS), a research organization, in the report. “A  rule to report breaches exists, but it is unenforceable. It says you’re  not liable if you’re following reasonable security practices. What  ‘reasonable’ means is not defined.”&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Supporters of stronger data protection laws in &lt;a href="http://www.pymnts.com/news/security-and-risk/2017/union-bank-of-india-cyberattack-eerily-similar-to-bangladesh-heist/" rel="noopener" target="_blank"&gt;India&lt;/a&gt; said that countries that have stronger cybersecurity laws on the books  would have started an inquiry into what happened with Reliance Jio. They  point to the data breach last week at Verizon. Verizon quickly  responded with an explanation of what went down, how it occurred and how  many customers’ data privacy it impacted. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;“India is at a nascent stage. For  good norms in Asia, look to Singapore. It’s been praised for not having  cybersecurity issues by the UN,” Srinivas Kodali, an independent  security researcher, said in the same Reuters report. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The report noted that in May there  were two data privacy breaches of Indian companies with the records of  17 million Zomato customers being compromised. In another breach, as  many as 135 million of India’s Aadhaar numbers had been stolen from  government databases and placed online. Aadhaar numbers are similar to  social security numbers. &lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/pymnts-july-17-2017-indians-call-for-more-stringent-data-protection-laws'&gt;https://cis-india.org/internet-governance/news/pymnts-july-17-2017-indians-call-for-more-stringent-data-protection-laws&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-07-18T13:36:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-sanjeeb-mukherjee-july-14-2017-centre-to-form-panel-to-encrypt-mgnrega-dbt-database-and-prevent-leaks">
    <title>Centre to form panel to 'encrypt' MGNREGA-DBT database and prevent leaks </title>
    <link>https://cis-india.org/internet-governance/news/business-standard-sanjeeb-mukherjee-july-14-2017-centre-to-form-panel-to-encrypt-mgnrega-dbt-database-and-prevent-leaks</link>
    <description>
        &lt;b&gt;Around 5 crore bank accounts of active MGNREGA workers yet to be seeded with Aadhaar.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;div&gt;The article by Sanjeeb Mukherjee was &lt;a class="external-link" href="http://www.business-standard.com/article/economy-policy/centre-to-form-panel-to-encrypt-mgnrega-dbt-database-and-prevent-leaks-117071400329_1.html"&gt;published in the Business Standard&lt;/a&gt; on July 14, 2017.&lt;/div&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Alarmed over reports of ‘public disclosure’ of sensitive Aadhaar data  through various portals and payment gateways, the Centre is in the  process of appointing a high-powered panel of almost 20 experts to  suggest ways and means through which data, particularly one which can be  accessed through the MGNREGA-DBT platform can be encrypted.&lt;/p&gt;
&lt;p&gt;Encryption, officials believe, would prevent the Aadhaar data and other related information from falling into wrong hands.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The need for proper encryption of Aadhaar data rose after the  government made it mandatory for availing almost all benefits - be it  school scholarships, payments of &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Mgnrega" target="_blank"&gt;MGNREGA &lt;/a&gt;wages, identification of beneficiaries under mid-day meal scheme and even public distribution system along with others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ensuring cyber security has become all the more necessary as the  Central government, in a notification issued last month, has made it  mandatory for all bank accounts to be seeded with Aadhaar numbers by  December 31, 2017, or else they would cease to be operational until the  time the account holder furnishes his &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar+Number" target="_blank"&gt;Aadhaar number.&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This could seriously hamper payment of wages to &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Mgnrega" target="_blank"&gt;MGNREGA &lt;/a&gt;workers because as per available information almost 5 crore active workers don’t have their bank accounts seeded with Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To complete the process before December 2017, the ministry of rural  development has planned special Aadhaar camps to be held in villages  from July 20 to September 2017.&lt;/p&gt;
&lt;p&gt;Recently, a website published all confidential details of customers of a  private telecom company including Aadhaar numbers and other  information.&lt;/p&gt;
&lt;p&gt;The breach was another instance of secure confidential information falling into public domain.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Officials of the panel, which would be headed by former NASSCOM head  Kiran Karnik are expected to submit their report on the same within the  next few months.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other members of the panel include Director General of National  Institute of Smart Governance (NISG), officials from Indian Computer  Emergency Response Team (ICERT) and others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, cyber security experts believe that encrypting Aadhaar-DBT  details mainly for those schemes and programmes which have a direct  linkage with the public at this later stage has its own challenges as  the entire ecosystem around Aadhaar has grown manifold ever since it was  made mandatory for a variety of programmes.&lt;/p&gt;
&lt;p&gt;Also, in the absence of a national encryption policy, such a move will have its own legal and regulatory challenges.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Ever since the government made Aadhaar mandatory for many things, the  entire ecosystem around it including the Central Identities Data  Repository (the agency which stores Aadhaar data is exposed to leaks,”  noted cyber law expert Pawan Duggal told &lt;i&gt;Business Standard.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He said that without a proper national encryption law, it would be  extremely challenging to provide legal and regulatory backing to encrypt  all Aadhaar- DBT data details for &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Mgnrega" target="_blank"&gt;MGNREGA.&lt;/a&gt; “Also now that the ‘cat is out of the bag,’ encryption of Aadhaar details will be hugely challenging,” Duggal said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Already, civil society activists said that after some concern, the  central government has removed all Aadhaar numbers and bank details from  &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Mgnrega" target="_blank"&gt;MGNREGA &lt;/a&gt;website, which has made tracking payments difficult.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A recent study by Amber Sinha and Srinivas Kodali from the Centre for  Internet and Society (CIS) found that granular details about individuals  including sensitive personally identifiable information such as Aadhaar  number, caste, religion, address, photographs and financial information  are only a few clicks away through government schemes dashboard and  portals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“While initiatives such as the government open data portals may be  laudable for providing easy access to government data condensed for easy  digestion, however in the absence of proper controls exercised by the  government departments the results can be disastrous by divulging  sensitive and adversely actionable information about the individuals who  are responding units of such databases,” the report said.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;It specifically studied two major schemes of the ministry of rural  development; the National National Social Assistance Programme and &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Mgnrega" target="_blank"&gt;MGNREGA &lt;/a&gt;along with some state schemes.&lt;br /&gt;
&lt;blockquote class="styleQ1 blockquoteBG"&gt;
&lt;div&gt;&lt;span&gt;&lt;b&gt;Pointers&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;a)  Centre to form a panel to encrypt all MGNREGA-DBT database to prevent leaks.&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;b) The panel might also suggest ways and means in which such ‘encryption’ could be applied in other platforms.&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;c)  The panel is expected to be headed by former NASSCOM head Kiran Karnik.&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;d) The encryption is essential as from January 2018 all non-Aadhaar  seeded bank accounts will cease to be operational unless the holders  seed them.&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;e)  A recent study found that vivid details about individuals can be easily accessed from government platforms and databases.&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;f)   The &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Mgnrega" target="_blank"&gt;MGNREGA &lt;/a&gt;database was one such publicly available platform which formed part of the study.&lt;/div&gt;
&lt;/blockquote&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-sanjeeb-mukherjee-july-14-2017-centre-to-form-panel-to-encrypt-mgnrega-dbt-database-and-prevent-leaks'&gt;https://cis-india.org/internet-governance/news/business-standard-sanjeeb-mukherjee-july-14-2017-centre-to-form-panel-to-encrypt-mgnrega-dbt-database-and-prevent-leaks&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-07-14T10:46:45Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-priyanka-mittal-july-12-2017-supreme-court-sets-up-constitution-bench-to-hear-aadhaar-privacy-issues">
    <title>Supreme Court sets up constitution bench to hear Aadhaar privacy issues</title>
    <link>https://cis-india.org/internet-governance/news/livemint-priyanka-mittal-july-12-2017-supreme-court-sets-up-constitution-bench-to-hear-aadhaar-privacy-issues</link>
    <description>
        &lt;b&gt;The Supreme Court ‘s five-judge constitution bench will also decide if the Aadhaar privacy issue should be heard by a larger bench.&lt;/b&gt;
        &lt;p&gt;The article by Priyanka Mittal was &lt;a class="external-link" href="http://www.livemint.com/Politics/qgZWZgkGo2S7QUTRo53jMN/Aadhaar-case-Constitution-Bench-hearing-on-18-19-July.html"&gt;published in Livemint&lt;/a&gt; on July 12, 2017. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;A five-judge constitution bench will hear  arguments on 18-19 July as  to whether Indian citizens have the right to privacy, and whether the  Aadhaar unique identity project breaches the right.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chief Justice  of India (CJI) J.S. Khehar on Wednesday set the dates for the hearing by  the constitution bench, which will decide whether the issue should be  heard by a larger bench.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Should the five-judge bench decide to rule on the case itself and not  refer it to a larger bench, it will decide the future of Aadhaar, which  has become the backbone of government welfare programmes, the tax  administration network and online financial transactions.&lt;/p&gt;
&lt;p&gt;This will be based on whether the right to privacy is a fundamental right of Indian citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy  rights activists argue that personal data gathered under the Aadhaar  programme, aimed at giving a unique 12-digit identity number to every  Indian, is vulnerable to abuse. Then attorney general Mukul Rohatgi told  the Supreme Court in 2015 that Indian citizens don’t have a fundamental  right to privacy under the Indian Constitution—an argument he repeated  subsequently.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“In the two-day hearing, the court is not  going to decide the full issue of privacy,” said Alok Prasanna Kumar, a  lawyer and visiting fellow at think tank Vidhi Centre for Legal Policy,  explaining how the Constitution bench is likely to proceed. “They are  going to take a call on whether, in light of precedents, there is a need  to refer the issue to a larger bench. There are past judgements and the  court will have to look at the scope of privacy under each to decide  the number of judges.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He added: “If the five-judge bench agrees with the precedents, then it would continue to address the angle of privacy; if not, then it would be referred back to the CJI to constitute a larger bench of nine judges.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All cases related to Aadhaar, including the right to privacy, will be  heard by the constitution bench; the court decided to set up the  constitution bench to hear the privacy case in August 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CJI’s decision came on a plea by advocate Shyam Divan, who has  appeared in several cases opposing Aadhaar, and attorney general K.K.  Venugopal seeking the speedy creation of a Constitution bench. It came a  week after justice J. Chelameswar said that all matters related to  Aadhaar should be addressed by a constitution bench.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I see it as  a step in the right direction. Personally, I hope that the privacy  issue is heard by a five-judge bench as against a larger bench as that  can bring more disagreement,” said Sunil Abraham, executive director of  Bengaluru-based research think tank Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last  month, the Supreme Court court upheld the government’s decision to link  Aadhaar with the permanent account number (PAN) for filing of  income-tax returns but ruled that non-compliance with the law will carry  no retrospective consequences.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the Aadhaar (Targeted  Delivery of Financial and Other Subsidies, Benefits and Services) Act,  2016, the unique identity number is mandatory only to receive social  welfare benefits.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-priyanka-mittal-july-12-2017-supreme-court-sets-up-constitution-bench-to-hear-aadhaar-privacy-issues'&gt;https://cis-india.org/internet-governance/news/livemint-priyanka-mittal-july-12-2017-supreme-court-sets-up-constitution-bench-to-hear-aadhaar-privacy-issues&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-07-14T10:55:04Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-july-10-2017-reliance-jio-data-leaked-on-website-report">
    <title>Reliance Jio data leaked on website : report</title>
    <link>https://cis-india.org/internet-governance/news/livemint-july-10-2017-reliance-jio-data-leaked-on-website-report</link>
    <description>
        &lt;b&gt;Reliance Jio customer data was leaked on independent website magicapk.com, including details such as names, mobile numbers and email IDs , said a report.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.livemint.com/Industry/ucK2SJDM4Ws8k36ovZVj6H/Reliance-Jio-customer-data-allegedly-compromised-report.html"&gt;published by Livemint&lt;/a&gt; on July 10, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Reliance Jio Infocomm Ltd’s customer data was allegedly leaked on an  independent website, magicapk.com, a report said. Jio, which crossed the  100 million mark in February, barely six months after it was launched,  ended the financial year with &lt;b&gt;&lt;a href="http://www.livemint.com/Industry/wVDwB0wKqaXxqVFqEWp4kK/Reliance-Jio-crosses-108-million-subscribers-claims-to-be-l.html" target="_blank"&gt;108.9 million subscribers &lt;/a&gt;&lt;/b&gt;as of 31 March.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report, published first in a late-night article on Sunday on &lt;b&gt;&lt;a href="http://www.fonearena.com/blog/224741/jio-customer-database-of-over-120-million-users-leaked-could-be-biggest-data-breach-in-india.html#more-224741" target="_blank"&gt;Fonearena.com&lt;/a&gt;&lt;/b&gt;,  alleged that “several sensitive details” were exposed, including  customers’ first and last names, mobile numbers, email IDs, circles, SIM  activation dates and even the Aadhaar numbers. The Aadhaar numbers,  however, were redacted on magicapk.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“To my disbelief I found my own details in the database and also couple  of my colleagues are affected too,” wrote Varun Krish, the author of the  article. However, if you now click on Magicapk.com, it reads: “This  Account has been &lt;a href="http://magicapk.com/cgi-sys/suspendedpage.cgi" target="_blank"&gt;suspended&lt;/a&gt; .” The Registrar of the site, according to the &lt;b&gt;&lt;a href="https://www.whois.com/whois/magicapk.com"&gt;whois database&lt;/a&gt;&lt;/b&gt;, is Godaddy.com, LLC.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When contacted, a Reliance Jio spokesperson said, “We have come  across the unverified and unsubstantiated claims of the website and are  investigating it. Prima facie, the data appears to be unauthentic. We  want to assure our subscribers that their data is safe and maintained  with highest security. Data is only shared with authorities as per their  requirement. We have informed law enforcement agencies about the claims  of the website and will follow through to ensure strict action is  taken.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Fonearena.com, on its site, has responded with a: “We still stand by our story.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  report assumes significance because the site exposed redacted Aadhaar  card details. There are nearly 1.2 billion Aadhaar number holders in the  country. Aadhaar aims to plug leakages in the delivery of state  benefits, such as subsidized grains to the poor, and aid in generating a  savings of about Rs70,000 crore a year for the government. But data  breaches have rattled citizens, especially since India does not have a  Privacy Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In March, the Unique Identification Authority of  India (UIDAI) blacklisted a common services centre for 10 years after it  shared the Aadhaar details of former cricket captain Mahendra Singh  Dhoni. On 25 April, &lt;i&gt;Mint &lt;/i&gt;reported that many government  departments, including the ministry of drinking water and sanitation,  the Jharkhand Directorate of Social Security, and the Kerala  government’s pension department, had published Aadhaar numbers of  beneficiaries of the schemes they run in &lt;b&gt;&lt;a href="http://www.livemint.com/Politics/bM6xWCw8rt6Si4seV43C2H/Govt-departments-breach-Aadhaar-Act-leak-details-of-benefic.html" target="_blank"&gt;violation of the Aadhaar Act&lt;/a&gt;&lt;/b&gt; .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On 1 May, Bengaluru-based think tank Centre for Internet and Society  (CIS) reported that a Central government ministry and a state government  may have &lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/information-security-practices-of-aadhaar-or-lack-thereof-a-documentation-of-public-availability-of-aadhaar-numbers-with-sensitive-personal-financial-information-1"&gt;made public up to 135 million Aadhaar numbers&lt;/a&gt;&lt;/b&gt; .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the Aadhaar (Targeted Delivery of Financial Subsidies, Benefits  and Services) Act, 2016, the unique identity number is mandatory only to  receive social welfare benefits. However, tagging of the Aadhaar number  is being made mandatory by the government for various schemes including  PAN (permanent account number) accounts for taxation. On 7 July, the  Supreme Court refused to pass any interim order against the mandatory  use of Aadhaar for various government schemes. It, instead, suggested  that petitioners call for&lt;a href="http://www.livemint.com/Politics/5bZrxjf4FpfbxZFhc9inbI/Aadhaarlinked-issues-to-be-decided-by-constitution-bench-S.html" target="_blank"&gt; immediate formation of a Constitution bench &lt;/a&gt;to decide on the case .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;News of the alleged data leak also comes at a time when there have been a spate of cyber hacks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For instance, just when companies started believing that WannaCry—the  malware that held over 200,000 individuals across 10,000 organizations  in nearly 100 countries to ransom—was on the wane, a virus christened  GoldenEye (a variant of the Petya ransomware) by security firm  Bitdefender Labs attacked companies, mostly in Ukraine. And while the  target primarily appeared to be European countries, the &lt;b&gt;&lt;a href="http://www.livemint.com/Technology/IUkweIPadyeIHRW7lFTysI/GoldenEye-ransomware-follows-in-WannaCrys-footsteps.html" target="_blank"&gt;ransomware was also reported&lt;/a&gt;&lt;/b&gt; to be making inroads in countries like India.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-july-10-2017-reliance-jio-data-leaked-on-website-report'&gt;https://cis-india.org/internet-governance/news/livemint-july-10-2017-reliance-jio-data-leaked-on-website-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-07-10T14:53:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-july-5-2017-sanjay-kumar-singh-act-now-to-protect-yourself-against-future-ransomware-attacks">
    <title>Act now to protect yourself against future ransomware attacks</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-july-5-2017-sanjay-kumar-singh-act-now-to-protect-yourself-against-future-ransomware-attacks</link>
    <description>
        &lt;b&gt;There was Wannacry, then Petya, and several other lesser-known ones: With ransomware attacks coming thick and fast, get proactive about protecting yourself.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Sanjay Kumar Singh was published by &lt;a class="external-link" href="http://www.business-standard.com/article/markets/act-now-to-protect-yourself-against-future-attacks-117070400742_1.html"&gt;Business Standard&lt;/a&gt; on July 5, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The Wannacry ransomware attack in May was followed by the Petya attack last week. This attack affected the Ukrainian government and large corporates like Maersk and Merck. In India it affected the operations of terminals at Jawaharlal Nehru Port Trust (JNPT), operated by Maersk. According to Kaspersky Lab, the rate of ransomware attacks on businesses grew from one every 120 seconds in January 2016 to one every 40 seconds by October that year. The rate of attack on individuals' computers rose from one every 20 seconds to one every 10 seconds over this period. Today, it has become imperative for everyone, including entrepreneurs and small business owners, to learn how to defend themselves against such attacks.          &lt;br /&gt;&lt;br /&gt;A trend witnessed in 2016 was the growth of ransomware-as-a-service business model. "Code creators offer their malicious product on demand, selling uniquely modified versions to criminals who then distribute it through spam and websites, paying a commission to the creator," says Altaf Halde, managing director, Kaspersky Lab (South Asia). He adds that the growth of cashless payments in India will undoubtedly attract the attention of cyber criminals and lead to more attacks in future.   &lt;br /&gt;&lt;br /&gt;Next, let us turn to how ransomware works. An operating system (OS) is a large and complicated piece of software with millions of lines of software code. A malware exploits vulnerabilities within the OS to infiltrate it. An infiltration can happen in multiple ways: if you download a malicious email attachment, visit a code-carrying web site, via an infected pen drive, and so on.&lt;br /&gt;&lt;br /&gt;Ransomware is a form of malware that encrypts the files in a critical part of the computer, such as My Documents or Desktop, where people usually store their files. It could also encrypt specific file types, say, such .doc files. The user is then informed that his files have been encrypted along with the warning that unless he pays up within the next few hours his files will be deleted. Says Udbhav Tiwari, policy officer at the Centre for Internet and Society, Bengaluru: "You first have to first pay the attackers using anonymous money like bitcoins and then they give you the key for decrypting your files."&lt;br /&gt;&lt;br /&gt;A ransomware attack can be dealt with in two ways: either pay the money and get the files unlocked, or find a way to circumvent the encryption. The latter option can, however, take a fair bit of time.&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;Safeguard measure you should adopt&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Back up important files regularly. Check periodically that these files have not  got damaged&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Enable ‘Show file extensions’ option in Windows settings. Stay away from extensions like “exe”, “vbs” and “scr”. Many &lt;a href="http://www.howtogeek.com/137270/50-file-extensions-that-are-potentially-dangerous-on-windows/" target="_blank"&gt;familiar file types can be dangerous&lt;/a&gt; as scammers use multiple extensions (like hot-chics.avi.exe or doc.scr)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;If you discover an unknown process on your machine, cut off the Internet connection immediately&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;If you have been infected, find the name of the ransomware. If it's an older version, your files can be restored. For restoration tools visit &lt;a href="https://www.nomoreransom.org/" target="_blank"&gt;https://www.nomoreransom.org/&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Among the safeguard measures you should adopt, first and foremost, never open a suspicious file. By being vigilant you can avoid a lot of ransomware attacks.&lt;br /&gt;&lt;br /&gt;Most malware exploit vulnerabilities within the OS. "These vulnerabilities are frequently patched by the creators of the OS. But if people use pirated OS, or don't upgrade it regularly, they could land in trouble," says Tiwari. Soon after the Wannacry attack, Microsoft had issued a patch. People who updated their computers immediately didn't get affected by it. Also, use the latest version of an OS.&lt;br /&gt;&lt;br /&gt; Use a quality antivirus (AV) solution, which is usually one you have to pay for. A high-quality AV can even protect you against vulnerabilities not patched by the OS manufacturer. AVs scan files. If they detect patterns indicating the presence of malware, they lock them apart from the rest of the computer, thereby preventing them from spreading.&lt;br /&gt;&lt;br /&gt; One option is to use an OS that is less vulnerable, like Mac and Linux. Fewer malware are designed for these OS as fewer people use them.&lt;br /&gt;&lt;br /&gt;Finally, if your files do get encrypted, don’t pay the ransom, unless instant access to those files is critical. "Each payment only fuels this unlawful business," says Halde.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-july-5-2017-sanjay-kumar-singh-act-now-to-protect-yourself-against-future-ransomware-attacks'&gt;https://cis-india.org/internet-governance/news/business-standard-july-5-2017-sanjay-kumar-singh-act-now-to-protect-yourself-against-future-ransomware-attacks&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-07-10T14:46:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/ivir-summer-course-on-privacy-law-and-policy">
    <title>IViR Summer Course on Privacy Law and Policy</title>
    <link>https://cis-india.org/internet-governance/news/ivir-summer-course-on-privacy-law-and-policy</link>
    <description>
        &lt;b&gt;attended the 2016 IViR Summer Course on International Privacy Law as a beneficiary of the OSF Civil Society Scholarship in Amsterdam from July 3 to 7, 2017. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The University of Amsterdam’s Institute for Information Law (IViR) announces the 6th &lt;b&gt;IVIR Summer Course on Privacy Law and Policy&lt;/b&gt;.  The course will focus on privacy law and policy related to the  Internet, electronic communications and online and social media.  It  will explore the broader trends and recent developments in this rapidly  changing field and explain how businesses, governments and other  stakeholders can achieve their goals within it. The course will feature a  distinguished faculty of European and US academics, regulators and  practitioners who will investigate the EU and US legal frameworks and  how they operate together. Participants will acquire the essential  knowledge necessary to navigate privacy law and policy for online  services that operate in the EU and the US. The seminar format promotes  interaction among participants and faculty, and incorporates a range of  practical exercises to apply the knowledge.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For more information &lt;a class="external-link" href="https://www.ivir.nl/courses/plp/"&gt;see the website&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/ivir-summer-course-on-privacy-law-and-policy'&gt;https://cis-india.org/internet-governance/news/ivir-summer-course-on-privacy-law-and-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-08-23T02:00:50Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
